certmichelin / RedscanLinks
☆34Updated 8 months ago
Alternatives and similar repositories for Redscan
Users that are interested in Redscan are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 3 months ago
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given pe…☆25Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- visually see issues with supported cipher suites☆16Updated 11 months ago
- A VS Code extension to preview XML nmap output☆44Updated 3 months ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last week
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Anonymize your hashcat formatted files for online cracking☆30Updated 7 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- Qemuno Framework☆24Updated 2 years ago
- ☆18Updated last year
- Tools that trigger False Positive AV alerts☆49Updated 5 months ago
- Continuous kerberoast monitor☆45Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- ☆16Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 9 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago